menu
QAmmunity.org
Recent questions in Computers and Technology
Login
Register
My account
Edit my Profile
Private messages
My favorites
Register
Recent questions in Computers and Technology
Ask a Question
Questions
Unanswered
Tags
Categories
Ask a Question
Recent questions in Computers and Technology
Cookie Snooping -Attackers use cookie snooping on victim systems to analyze users' surfing habits and sell that information to other attackers or to launch various attacks on the victims' web applications.
Mayer Spitz
asked
Jul 20, 2023
by
Mayer Spitz
6.4k
points
Computers and Technology
high-school
1
answer
13
votes
23.1k
views
When Web site visitors are involved in downloading malicious code without their knowledge, they may be unknowingly involved in what type of process
Grooveek
asked
Jul 20, 2023
by
Grooveek
6.3k
points
Computers and Technology
high-school
1
answer
4
votes
103k
views
What are some of the ways in which you can prevent personal identity theft? Here are some guidelines that will help keep your online interactions secure from identity theft. 1.Never divulge your social
Mohamed Badr
asked
Jul 20, 2023
by
Mohamed Badr
6.4k
points
Computers and Technology
high-school
1
answer
3
votes
7.2k
views
Tell how to code this in notepad by html code
Honeylet
asked
Jul 20, 2023
by
Honeylet
7.2k
points
Computers and Technology
college
1
answer
9
votes
140k
views
Review Questions 1. Explain the difference between authentication and authorization.
James Thorpe
asked
Jul 20, 2023
by
James Thorpe
6.0k
points
Computers and Technology
college
1
answer
10
votes
152k
views
With an Internet connection, you can view, modify and delete files stored in your cloud storage account at anytime, from any______ or mobile device.
Itiel
asked
Jul 20, 2023
by
Itiel
6.9k
points
Computers and Technology
college
1
answer
6
votes
131k
views
Where can you get help to create citations for ProQuest articles? Select one: a. By checking the USP handbook b. All of the above c. By using ProQuest's "CITE" button d. By checking your writing textbook
Sliljedal
asked
Jul 20, 2023
by
Sliljedal
6.3k
points
Computers and Technology
college
1
answer
2
votes
209k
views
To paste a formula, you should use which of the following keyboard shortcuts? * Control V Control C Control B Control A
Valen
asked
Jul 20, 2023
by
Valen
7.0k
points
Computers and Technology
college
1
answer
21
votes
189k
views
How do you change the desktop background in the macos mojave operating system?
Thrag
asked
Jul 20, 2023
by
Thrag
6.8k
points
Computers and Technology
high-school
1
answer
4
votes
122k
views
The diagram shows the parts of a computer. In which part is data processing done?
Giorgos Dimtsas
asked
Jul 20, 2023
by
Giorgos Dimtsas
6.2k
points
Computers and Technology
high-school
2
answers
18
votes
17.8k
views
I hear random heartbeats during my calls,what is this? Is this anything bad or anything dangerous to do with spying or hacking?
Tamiz
asked
Jul 20, 2023
by
Tamiz
6.5k
points
Computers and Technology
college
1
answer
5
votes
232k
views
Which statement best describes network security?
Hawkexp
asked
Jul 20, 2023
by
Hawkexp
6.4k
points
Computers and Technology
high-school
1
answer
13
votes
8.3k
views
If you need to add more data between column a and column b, you should _____. click in column a and paste a column click anywhere in column a and use the insert column command click anywhere in column
Han XIAO
asked
Jul 20, 2023
by
Han XIAO
7.4k
points
Computers and Technology
high-school
2
answers
8
votes
175k
views
When I want to view the Internet, I use this tool that converts html code into a visual format for users to view and interact with URL search engine directory browser
Eeliya
asked
Jul 20, 2023
by
Eeliya
7.0k
points
Computers and Technology
high-school
1
answer
2
votes
215k
views
Please code in python and add comments to code Question: Get a 4 or more digit number from the user and check if the number is Palindrome Number.
Tenten Ponce
asked
Jul 20, 2023
by
Tenten Ponce
6.5k
points
Computers and Technology
college
1
answer
18
votes
152k
views
Which method should be used to search for an exact phrase?.
Nastro
asked
Jul 20, 2023
by
Nastro
6.3k
points
Computers and Technology
high-school
1
answer
8
votes
92.1k
views
What is the role of Computer Aided Qualitative Data Analysis Software (CAQDAS)? Please can someone answer this in a 200 word paragraph please I will give 100 point and will give Brainleiest to who ever
Amandeep Singh
asked
Jul 20, 2023
by
Amandeep Singh
6.5k
points
Computers and Technology
college
1
answer
2
votes
170k
views
You've been hired to create an application. This application requires that you ask for and record the user's first name, last name, and age in years. What would you do to ensure that the data that is entered
Alfro
asked
Jul 20, 2023
by
Alfro
6.6k
points
Computers and Technology
high-school
1
answer
10
votes
95.9k
views
smartphones and tablets currently outsell laptop and desktop computers. this statement describes the trend known as .
Joshua Pokotilow
asked
Jul 20, 2023
by
Joshua Pokotilow
6.6k
points
Computers and Technology
high-school
1
answer
4
votes
160k
views
Byte pair encoding is a data encoding technique. The encoding algorithm looks for pairs of characters that appear in the string more than once and replaces each instance of that pair with a corresponding
Jedyobidan
asked
Jul 20, 2023
by
Jedyobidan
7.2k
points
Computers and Technology
high-school
1
answer
10
votes
106k
views
Page:
« prev
1
...
265
266
267
268
269
270
271
...
1000
...
next »
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
7.4m
questions
9.9m
answers
Other Questions
What goal of the constitution was also a goal of the Magna Carta?
How did world war 1 affect the racial and ethnic makeup of american cities
Who was the boy who became king at the age of 9?
Which of the objects is living or nonliving: Bacteria, virus, moss, you, a lemon seed, the air, bread, lettuce and rocks?
How do you estimate of 4 5/8 X 1/3
Search QAmmunity.org